Computer Networking
Which router command allows you to view the entire contents of all access lists?

show all access-lists
show ip interface
show interface
show access-lists

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for encapsulation?

None of these
a technique used in best-effort delivery systems to avoid endlessly looping packets.
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.
All of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You telnet into a remote device and type debug ip rip, but no output from the debug command is seen. What could the problem be?

Debug output is sent only to the console.
IP addressing on the network is incorrect.
You must type the show ip rip command first.
You must use the terminal monitor command.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer

After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device
The network becomes less efficient
The network becomes more efficient
An additional token is added for every 1,000 nodes
The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500

ANSWER DOWNLOAD EXAMIANS APP